Hiding Traffic Patterns in VoIP Communication

dc.contributor.advisor Yong Guan
dc.contributor.author Fang, Jialue
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2018-08-11T14:54:09.000
dc.date.accessioned 2020-06-30T03:05:47Z
dc.date.available 2020-06-30T03:05:47Z
dc.date.copyright Fri Jan 01 00:00:00 UTC 2016
dc.date.embargo 2001-01-01
dc.date.issued 2016-01-01
dc.description.abstract <p>Voice over IP(VoIP) is widely used in today's communication, VoIP is a methodology that able to converts analog voice signals into digital data packets and support real-time, two-way transmission of conversations using Internet Protocol. Despite of the fact that VoIP technology have greatly developed since the earliest design, it still suffer from the common problem that affect Internet security: hacker. Currently Timing-based attack is the most famous attack method on VoIP. Timing-based traffic analysis attacks mainly based on packet inter-arrival time. Attackers are able to analyze the packet sending time intervals and export user's talking pattern. Finally, attacker can identify the user by comparing the exported talking pattern with the talking pattern in their databases. Therefore, to protect user's identity, we propose a new application to hide user's talking pattern.</p> <p>In this thesis, we address issues related to traffic analysis attacks and the corresponding countermeasures in VoIP traffic. We focus on a particular class of traffic analysis attack, timing-based correlation attacks, by which an adversary attempt to analyze packet inter-arrival time of a user and correlate the output traffic with the traffic in their database. Correlation method that is used in this type of attack, namely Dynamic Time Warping(DTW) based Correlation. Based on our threat model and known strategies in existing VoIP communication, we develop methods that can effectively counter the timing-based correlation attacks. The empirical results shows the effectiveness of the proposed scheme in term of countering timing-based correlation attacks.</p> <p>Our experimental result showed that our application is able to hide user's identity in VoIP communication, with a few modifications in the sending process.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/15698/
dc.identifier.articleid 6705
dc.identifier.contextkey 11165013
dc.identifier.doi https://doi.org/10.31274/etd-180810-5326
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/15698
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/29881
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/15698/Fang_iastate_0097M_15866.pdf|||Fri Jan 14 20:45:01 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.keywords Pattern Hiding
dc.subject.keywords VoIP
dc.title Hiding Traffic Patterns in VoIP Communication
dc.type thesis
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Computer Engineering
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Fang_iastate_0097M_15866.pdf
Size:
1.7 MB
Format:
Adobe Portable Document Format
Description: